-
3
-
-
84874435442
-
AppGuard - Enforcing user requirements on android apps
-
Springer Berlin Heidelberg
-
Backes, M., Gerling, S., Hammer, C., Maffei, M. and Styp-Rekowsky, P.V. AppGuard - Enforcing User Requirements on Android Apps. In Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidelberg, 2013, 543-548.
-
(2013)
Tools and Algorithms for the Construction and Analysis of Systems
, pp. 543-548
-
-
Backes, M.1
Gerling, S.2
Hammer, C.3
Maffei, M.4
Styp-Rekowsky, P.V.5
-
6
-
-
80051969895
-
Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices
-
IEEE
-
Becher, M., Freiling, F.C., Hoffmann, J., Holz, T., et al. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. In Symposium on Security and Privacy. IEEE, 2011, 96-111.
-
(2011)
Symposium on Security and Privacy
, pp. 96-111
-
-
Becher, M.1
Freiling, F.C.2
Hoffmann, J.3
Holz, T.4
-
7
-
-
85040713863
-
Android and iOS users' differences concerning security and privacy
-
ACM
-
Benenson, Z., Gassmann, F. and Reinfelder, L. Android and iOS Users' Differences Concerning Security and Privacy. In CHI '13 Extended Abstracts on Human Factors in Computing Systems. ACM, 2013, 817-822.
-
(2013)
CHI '13 Extended Abstracts on Human Factors in Computing Systems
, pp. 817-822
-
-
Benenson, Z.1
Gassmann, F.2
Reinfelder, L.3
-
11
-
-
0142103313
-
Security and privacy in sensor networks
-
Chan, H. and Perrig, A. Security and privacy in sensor networks. Computer 36, 10, 2003, 103-105.
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
13
-
-
3042780572
-
Using the experience sampling method to evaluate ubicomp applications
-
Consolvo, S. and Walker, M. Using the experience sampling method to evaluate ubicomp applications. IEEE Pervasive Computing 2, 2, 2003, 24-31.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.2
, pp. 24-31
-
-
Consolvo, S.1
Walker, M.2
-
14
-
-
84961997478
-
-
retrieved 1/05/2015
-
Dashboards for Android Developers. https://developer.android.com/about/dashboards/index.html, retrieved 1/05/2015.
-
Dashboards for Android Developers
-
-
-
16
-
-
85001818197
-
Privacy and security in E-learning
-
El-Khatib, K., Korba, L., Xu, Y. and Yee, G. Privacy and Security in E-Learning. International Journal of Distance Education Technologies (IJDET) 1, 4, 2003, 1-19.
-
(2003)
International Journal of Distance Education Technologies (IJDET)
, vol.1
, Issue.4
, pp. 1-19
-
-
El-Khatib, K.1
Korba, L.2
Xu, Y.3
Yee, G.4
-
17
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
USENIX Association
-
Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., et al. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation. USENIX Association, 2010, 1-6.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
-
18
-
-
84869487159
-
Why Eve and mallory love android: An analysis of android SSL (in)Security
-
ACM
-
Fahl, S., Harbach, M., Muders, T., Baumgärtner, L., et al. Why Eve and Mallory Love Android: An Analysis of Android SSL (in)Security. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM, 2012, 50-61.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Baumgärtner, L.4
-
19
-
-
84889022608
-
Rethinking SSL development in an appified world
-
ACM
-
Fahl, S., Harbach, M., Perl, H., Koetter, M. and Smith, M. Rethinking SSL Development in an Appified World. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM, 2013, 49-60.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 49-60
-
-
Fahl, S.1
Harbach, M.2
Perl, H.3
Koetter, M.4
Smith, M.5
-
20
-
-
84869821127
-
I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns
-
ACM
-
Felt, A.P., Egelman, S. and Wagner, D. I've Got 99 Problems, but Vibration Ain'T One: A Survey of Smartphone Users' Concerns. In Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM, 2012, 33-44.
-
(2012)
Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 33-44
-
-
Felt, A.P.1
Egelman, S.2
Wagner, D.3
-
21
-
-
80755181021
-
A survey of mobile malware in the wild
-
ACM
-
Felt, A.P., Finifter, M., Chin, E., Hanna, S. and Wagner, D. A Survey of Mobile Malware in the Wild. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM, 2011, 3-14.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
22
-
-
84885222364
-
Revisiting human-battery interaction with an interactive battery interface
-
ACM
-
Ferreira, D., Ferreira, E., Goncalves, J., Kostakos, V. and Dey, A.K. Revisiting Human-Battery Interaction with an Interactive Battery Interface. In Ubicomp. ACM, 2013, 563-572.
-
(2013)
Ubicomp
, pp. 563-572
-
-
Ferreira, D.1
Ferreira, E.2
Goncalves, J.3
Kostakos, V.4
Dey, A.K.5
-
23
-
-
85031499848
-
AWARE: Mobile context instrumentation framework
-
Ferreira, D., Kostakos, V. and Dey, A.K. AWARE: mobile context instrumentation framework. Frontiers in ICT 2:6, (2015) DOI: 10.3389/fict.2015.00006.
-
(2015)
Frontiers in ICT
, vol.2
, pp. 6
-
-
Ferreira, D.1
Kostakos, V.2
Dey, A.K.3
-
24
-
-
84870268604
-
Lessons learned from large-scale user studies: Using android market as a source of data
-
Ferreira, D., Kostakos, V. and Dey, A.K. Lessons Learned from Large-Scale User Studies: Using Android Market as a Source of Data. International Journal of Mobile Human Computer Interaction 4, 3, 2012, 28-43.
-
(2012)
International Journal of Mobile Human Computer Interaction
, vol.4
, Issue.3
, pp. 28-43
-
-
Ferreira, D.1
Kostakos, V.2
Dey, A.K.3
-
25
-
-
85022222236
-
Why people hate your app: Making sense of user feedback in a mobile app store
-
ACM
-
Fu, B., Lin, J., Li, L., Faloutsos, C., et al. Why People Hate Your App: Making Sense of User Feedback in a Mobile App Store. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2013, 1276-1284.
-
(2013)
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 1276-1284
-
-
Fu, B.1
Lin, J.2
Li, L.3
Faloutsos, C.4
-
26
-
-
84910653435
-
A field study of run-time location access disclosures on android smartphones
-
2014
-
Fu, H., Yang, Y., Shingte, N., Lindqvist, J. and Gruteser, M. A Field Study of Run-Time Location Access Disclosures on Android Smartphones. In USEC'14. 2014.
-
USEC'14
-
-
Fu, H.1
Yang, Y.2
Shingte, N.3
Lindqvist, J.4
Gruteser, M.5
-
27
-
-
84894862758
-
Quantifying and classifying covert communications on android
-
Hill, R., Hansen, M. and Singh, V. Quantifying and Classifying Covert Communications on Android. Mobile Networks and Applications 19, 1, 2014, 79-87.
-
Mobile Networks and Applications 19
, vol.1
, Issue.2014
, pp. 79-87
-
-
Hill, R.1
Hansen, M.2
Singh, V.3
-
28
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
ACM
-
Hornyack, P., Han, S., Jung, J., Schechter, S. and Wetherall, D. These Aren'T the Droids You'Re Looking for: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 2011, 639-652.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 639-652
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
29
-
-
3042594839
-
The security and privacy of smart vehicles
-
LCA-ARTICLE-2004-007
-
Hubaux, J.-P., Capkun, S. and Luo, J. The security and privacy of smart vehicles. IEEE Security & Privacy Magazine 2, LCA-ARTICLE-2004-007, 2004, 49-55.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, pp. 49-55
-
-
Hubaux, J.-P.1
Capkun, S.2
Luo, J.3
-
30
-
-
84962032764
-
-
retrieved 14/03/2014
-
IANA TCP/IP port specifications. http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?&page=126, retrieved 14/03/2014.
-
IANA TCP/IP Port Specifications
-
-
-
32
-
-
84868375110
-
A conundrum of permissions: Installing applications on an android smartphone
-
Springer Berlin Heidelberg
-
Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012, 68-79.
-
(2012)
Financial Cryptography and Data Security
, pp. 68-79
-
-
Kelley, P.G.1
Consolvo, S.2
Cranor, L.F.3
Jung, J.4
-
33
-
-
84877938356
-
Privacy as part of the app decision-making process
-
ACM
-
Kelley, P.G., Cranor, L.F. and Sadeh, N. Privacy As Part of the App Decision-making Process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2013, 3393-3402.
-
(2013)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 3393-3402
-
-
Kelley, P.G.1
Cranor, L.F.2
Sadeh, N.3
-
34
-
-
80054056884
-
Who's your best friend?: Targeted privacy attacks in location-sharing social networks
-
ACM
-
Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N., et al. Who's your best friend?: targeted privacy attacks in location-sharing social networks. In Ubicomp. ACM, 2011, 177-186.
-
(2011)
Ubicomp
, pp. 177-186
-
-
Kostakos, V.1
Venkatanathan, J.2
Reynolds, B.3
Sadeh, N.4
-
35
-
-
84867459428
-
Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing
-
ACM
-
Lin, J., Amini, S., Hong, J.I., Sadeh, N., et al. Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy Through Crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 2012, 501-510.
-
(2012)
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
, pp. 501-510
-
-
Lin, J.1
Amini, S.2
Hong, J.I.3
Sadeh, N.4
-
36
-
-
84962006013
-
-
retrieved 11/03/2014
-
Manifest permissions for Android Developers. http://developer.android.com/reference/android/Manifest.permission.html, retrieved 11/03/2014.
-
Manifest Permissions for Android Developers
-
-
-
37
-
-
84962006012
-
-
retrieved 05/09/2014
-
Moto X: the Google phone that's always listening. http://www.telegraph.co.uk/technology/google/10217856/Moto-X-the-Google-phone-thats-always-listening.html, retrieved 05/09/2014.
-
Moto X: The Google Phone That's Always Listening
-
-
-
38
-
-
84921046658
-
Realization of a user-centric, privacy preserving permission framework for android
-
Nauman, M., Khan, S., Othman, A.T. and Musa, S. Realization of a user-centric, privacy preserving permission framework for Android. Security Comm. Networks 8, 3, 2014, 368-382.
-
(2014)
Security Comm. Networks
, vol.8
, Issue.3
, pp. 368-382
-
-
Nauman, M.1
Khan, S.2
Othman, A.T.3
Musa, S.4
-
39
-
-
77954487766
-
Apex: Extending android permission model and enforcement with user-defined runtime constraints
-
ACM
-
Nauman, M., Khan, S. and Zhang, X. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010, 328-332.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 328-332
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
40
-
-
84962002028
-
-
retrieved 17/09/2014
-
The new Moto X is 'always listening' - and so is the NSA!. http://www.techradar.com/us/news/phone-and-communications/mobile-phones/the-new-moto-x-is-always-listening-and-so-is-the-nsa-1170553, retrieved 17/09/2014.
-
The New Moto X is 'always Listening'- and So is the NSA!
-
-
-
41
-
-
84869594449
-
Android security permissions - Can we Trust them?
-
Springer Berlin Heidelberg
-
Orthacker, C., Teufl, P., Kraxberger, S., Lackner, G., et al. Android Security Permissions - Can We Trust Them? In Security and Privacy in Mobile Information and Communication Systems. Springer Berlin Heidelberg, 2012, 40-51.
-
(2012)
Security and Privacy in Mobile Information and Communication Systems
, pp. 40-51
-
-
Orthacker, C.1
Teufl, P.2
Kraxberger, S.3
Lackner, G.4
-
42
-
-
84874865861
-
AppsPlayground: Automatic security analysis of smartphone applications
-
ACM
-
Rastogi, V., Chen, Y. and Enck, W. AppsPlayground: Automatic Security Analysis of Smartphone Applications. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy. ACM, 2013, 209-220.
-
(2013)
Proceedings of the Third ACM Conference on Data and Application Security and Privacy
, pp. 209-220
-
-
Rastogi, V.1
Chen, Y.2
Enck, W.3
-
45
-
-
84957795003
-
-
retrieved 11/09/2014
-
Review app permissions. https://support.google.com/googleplay/answer/6014972?p=app-permissions&rd=1, retrieved 11/09/2014.
-
Review App Permissions
-
-
-
46
-
-
67650293214
-
Understanding and capturing people's privacy policies in a mobile social networking application
-
Sadeh, N., Hong, J., Cranor, L., Fette, I., et al. Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application. Personal Ubiquitous Comput 13, 6, 2009, 401-412.
-
Personal Ubiquitous Comput 13
, vol.6
, Issue.2009
, pp. 401-412
-
-
Sadeh, N.1
Hong, J.2
Cranor, L.3
Fette, I.4
-
48
-
-
79951899261
-
A small but non-negligible flaw in the android permission scheme
-
IEEE
-
Shin, W., Kwak, S., Kiyomoto, S., Fukushima, K. and Tanaka, T. A Small But Non-negligible Flaw in the Android Permission Scheme. In International Symposium on Policies for Distributed Systems and Networks. IEEE, 2010, 107-110.
-
(2010)
International Symposium on Policies for Distributed Systems and Networks
, pp. 107-110
-
-
Shin, W.1
Kwak, S.2
Kiyomoto, S.3
Fukushima, K.4
Tanaka, T.5
-
49
-
-
84907413882
-
The company you keep: Mobile malware infection rates and inexpensive risk indicators
-
International World Wide Web Conferences Steering Committee
-
Truong, H.T.T., Lagerspetz, E., Nurmi, P., Oliner, A.J., et al. The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators. In Proceedings of the 23rd International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2014, 39-50.
-
(2014)
Proceedings of the 23rd International Conference on World Wide Web
, pp. 39-50
-
-
Truong, H.T.T.1
Lagerspetz, E.2
Nurmi, P.3
Oliner, A.J.4
-
50
-
-
84881191297
-
Accounting for roaming users on mobile data access: Issues and root causes
-
ACM
-
Tu, G.-H., Peng, C., Li, C.-Y., Ma, X., et al. Accounting for Roaming Users on Mobile Data Access: Issues and Root Causes. In Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 2013, 305-318.
-
(2013)
Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services
, pp. 305-318
-
-
Tu, G.-H.1
Peng, C.2
Li, C.-Y.3
Ma, X.4
-
52
-
-
84883384084
-
Kepler - Raising browser security awareness
-
th Int. Software Testing, Verification and Validation Workshops (ICSTW), 2013, 435-440.
-
(2013)
th Int. Software Testing, Verification and Validation Workshops (ICSTW)
, pp. 435-440
-
-
Wahlberg, T.1
Paakkola, P.2
Wieser, C.3
Laakso, M.4
Roning, J.5
-
53
-
-
79961035462
-
AppJoy: Personalized mobile application discovery
-
New York, New York, USA
-
Yan, B. and Chen, G. AppJoy: personalized mobile application discovery. In MobiSys. New York, New York, USA, 2011, 113-126.
-
(2011)
MobiSys
, pp. 113-126
-
-
Yan, B.1
Chen, G.2
-
54
-
-
84889041424
-
AppIntent: Analyzing sensitive data transmission in android for privacy leakage detection
-
ACM
-
Yang, Z., Yang, M., Zhang, Y., Gu, G., et al. AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013, 1043-1054.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 1043-1054
-
-
Yang, Z.1
Yang, M.2
Zhang, Y.3
Gu, G.4
-
55
-
-
77954845334
-
Privacy and security for online social networks: Challenges and opportunities
-
IEEE
-
Zhang, C., Sun, J., Zhu, X. and Fang, Y. Privacy and security for online social networks: challenges and opportunities. Network, IEEE 24, 4, 2010, 13-18.
-
(2010)
Network
, vol.24
, Issue.4
, pp. 13-18
-
-
Zhang, C.1
Sun, J.2
Zhu, X.3
Fang, Y.4
-
56
-
-
84889068951
-
Vetting undesirable behaviors in android apps with permission use analysis
-
ACM
-
Zhang, Y., Yang, M., Xu, B., Yang, Z., et al. Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM, 2013, 611-622.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 611-622
-
-
Zhang, Y.1
Yang, M.2
Xu, B.3
Yang, Z.4
|